* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Spacecraft Onboard Interface Systems—Low Data
Computer security wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wireless USB wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wireless security wikipedia , lookup
IEEE 802.11 wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Airborne Networking wikipedia , lookup
Recommendation for Space Data System Practices SPACECRAFT ONBOARD INTERFACE SYSTEMS—LOW DATA-RATE WIRELESS COMMUNICATIONS FOR SPACECRAFT MONITORING AND CONTROL RECOMMENDED PRACTICE CCSDS 882.0-M-1 MAGENTA BOOK May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS AUTHORITY Issue: Recommended Practice, Issue 1 Date: May 2013 Location: Washington, DC, USA This document has been approved for publication by the Management Council of the Consultative Committee for Space Data Systems (CCSDS) and represents the consensus technical agreement of the participating CCSDS Member Agencies. The procedure for review and authorization of CCSDS documents is detailed in Organization and Processes for the Consultative Committee for Space Data Systems (CCSDS A02.1-Y-3), and the record of Agency participation in the authorization of this document can be obtained from the CCSDS Secretariat at the address below. This document is published and maintained by: CCSDS Secretariat Space Communications and Navigation Office, 7L70 Space Operations Mission Directorate NASA Headquarters Washington, DC 20546-0001, USA CCSDS 882.0-M-1 Page i May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS STATEMENT OF INTENT The Consultative Committee for Space Data Systems (CCSDS) is an organization officially established by the management of its members. The Committee meets periodically to address data systems problems that are common to all participants, and to formulate sound technical solutions to these problems. Inasmuch as participation in the CCSDS is completely voluntary, the results of Committee actions are termed Recommendations and are not in themselves considered binding on any Agency. CCSDS Recommendations take two forms: Recommended Standards that are prescriptive and are the formal vehicles by which CCSDS Agencies create the standards that specify how elements of their space mission support infrastructure shall operate and interoperate with others; and Recommended Practices that are more descriptive in nature and are intended to provide general guidance about how to approach a particular problem associated with space mission support. This Recommended Practice is issued by, and represents the consensus of, the CCSDS members. Endorsement of this Recommended Practice is entirely voluntary and does not imply a commitment by any Agency or organization to implement its recommendations in a prescriptive sense. No later than three years from its date of issuance, this Recommended Practice will be reviewed by the CCSDS to determine whether it should: (1) remain in effect without change; (2) be changed to reflect the impact of new technologies, new requirements, or new directions; or (3) be retired or canceled. In those instances when a new version of a Recommended Practice is issued, existing CCSDS-related member Practices and implementations are not negated or deemed to be nonCCSDS compatible. It is the responsibility of each member to determine when such Practices or implementations are to be modified. Each member is, however, strongly encouraged to direct planning for its new Practices and implementations towards the later version of the Recommended Practice. CCSDS 882.0-M-1 Page ii May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS FOREWORD This document is a CCSDS Recommended Practice, which is the consensus result as of the date of publication of the Best Practices for low data-rate communication systems for spacecraft monitor and control in support of space missions. Through the process of normal evolution, it is expected that expansion, deletion, or modification of this document may occur. This Recommended Practice is therefore subject to CCSDS document management and change control procedures, which are defined in the Organization and Processes for the Consultative Committee for Space Data Systems (CCSDS A02.1-Y-3). Current versions of CCSDS documents are maintained at the CCSDS Web site: http://www.ccsds.org/ Questions relating to the contents or status of this document should be addressed to the CCSDS Secretariat at the address indicated on page i. CCSDS 882.0-M-1 Page iii May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS At time of publication, the active Member and Observer Agencies of the CCSDS were: Member Agencies – – – – – – – – – – – Agenzia Spaziale Italiana (ASI)/Italy. Canadian Space Agency (CSA)/Canada. Centre National d’Etudes Spatiales (CNES)/France. China National Space Administration (CNSA)/People’s Republic of China. Deutsches Zentrum für Luft- und Raumfahrt e.V. (DLR)/Germany. European Space Agency (ESA)/Europe. Federal Space Agency (FSA)/Russian Federation. Instituto Nacional de Pesquisas Espaciais (INPE)/Brazil. Japan Aerospace Exploration Agency (JAXA)/Japan. National Aeronautics and Space Administration (NASA)/USA. UK Space Agency/United Kingdom. Observer Agencies – – – – – – – – – – – – – – – – – – – – – – – – – – – – Austrian Space Agency (ASA)/Austria. Belgian Federal Science Policy Office (BFSPO)/Belgium. Central Research Institute of Machine Building (TsNIIMash)/Russian Federation. China Satellite Launch and Tracking Control General, Beijing Institute of Tracking and Telecommunications Technology (CLTC/BITTT)/China. Chinese Academy of Sciences (CAS)/China. Chinese Academy of Space Technology (CAST)/China. Commonwealth Scientific and Industrial Research Organization (CSIRO)/Australia. CSIR Satellite Applications Centre (CSIR)/Republic of South Africa. Danish National Space Center (DNSC)/Denmark. Departamento de Ciência e Tecnologia Aeroespacial (DCTA)/Brazil. European Organization for the Exploitation of Meteorological Satellites (EUMETSAT)/Europe. European Telecommunications Satellite Organization (EUTELSAT)/Europe. Geo-Informatics and Space Technology Development Agency (GISTDA)/Thailand. Hellenic National Space Committee (HNSC)/Greece. Indian Space Research Organization (ISRO)/India. Institute of Space Research (IKI)/Russian Federation. KFKI Research Institute for Particle & Nuclear Physics (KFKI)/Hungary. Korea Aerospace Research Institute (KARI)/Korea. Ministry of Communications (MOC)/Israel. National Institute of Information and Communications Technology (NICT)/Japan. National Oceanic and Atmospheric Administration (NOAA)/USA. National Space Agency of the Republic of Kazakhstan (NSARK)/Kazakhstan. National Space Organization (NSPO)/Chinese Taipei. Naval Center for Space Technology (NCST)/USA. Scientific and Technological Research Council of Turkey (TUBITAK)/Turkey. Space and Upper Atmosphere Research Commission (SUPARCO)/Pakistan. Swedish Space Corporation (SSC)/Sweden. United States Geological Survey (USGS)/USA. CCSDS 882.0-M-1 Page iv May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS DOCUMENT CONTROL Document Title Date Status CCSDS 882.0-M-1 Spacecraft Onboard Interface Systems—Low Data-Rate Wireless Communications for Spacecraft Monitoring and Control, Recommended Practice, Issue 1 May 2013 Current issue CCSDS 882.0-M-1 Page v May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS CONTENTS Section 1 INTRODUCTION.......................................................................................................... 1-1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 2 PURPOSE ............................................................................................................... 1-1 SCOPE .................................................................................................................... 1-1 APPLICABILITY ................................................................................................... 1-1 RATIONALE.......................................................................................................... 1-1 DOCUMENT STRUCTURE ................................................................................. 1-1 DEFINITIONS........................................................................................................ 1-2 CONVENTIONS .................................................................................................... 1-2 REFERENCES ....................................................................................................... 1-3 OVERVIEW ................................................................................................................... 2-1 2.1 2.2 2.3 2.4 2.5 2.6 3 Page RATIONALE AND BENEFITS ............................................................................ 2-1 SCOPE OF INTEROPERABILITY ....................................................................... 2-1 EVOLUTION OF THE BOOK .............................................................................. 2-2 DIFFERENTIATING CONTENTION-BASED AND SCHEDULED CHANNEL ACCESS .................................................................... 2-3 SECURITY PROVISIONING ............................................................................... 2-4 QUALITY OF SERVICE PROVISIONING ......................................................... 2-4 RECOMMENDED PRACTICES FOR LOW DATA-RATE WIRELESS COMMUNICATIONS FOR SPACECRAFT MONITORING AND CONTROL ............................................................................... 3-1 3.1 3.2 OVERVIEW ........................................................................................................... 3-1 RECOMMENDED PRACTICES .......................................................................... 3-1 ANNEX A JUSTIFYING THE SCHEDULED MEDIUM ACCESS RECOMMENDATION (INFORMATIVE) ............................................... A-1 ANNEX B SECURITY CONCERNS FOR WIRELESS SYSTEMS (INFORMATIVE) ..........................................................................................B-1 ANNEX C DISCUSSION ON LOW DATA-RATE WIRELESS COMMUNICATIONS FOR SPACECRAFT MONITORING AND CONTROL (INFORMATIVE).......................................................... C-1 ANNEX D JUSTIFICATIONS FOR THE 2.4 GHZ BAND PREFERENCE (INFORMATIVE) ......................................................................................... D-1 ANNEX E ABBREVIATIONS AND ACRONYMS (INFORMATIVE).....................E-1 ANNEX F INFORMATIVE REFERENCES (INFORMATIVE) ............................... F-1 CCSDS 882.0-M-1 Page vi May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS CONTENTS (continued) Figure Page 2-1 IEEE 802.15.4 Superframe ........................................................................................... 2-5 Table 2-1 PHY/MAC Security Service Provisioning ................................................................... 2-4 C-1 Application Profile Quick Look-Up Table ...................................................................C-4 C-2 Quick-Look Table for Scenarios That Can Utilize Low Data-Rate Wireless Communications ...........................................................................................................C-4 C-3 Typical Operating Parameters for the Single-Hop, Periodic Data Aggregation Application Profile ........................................................................................................C-6 C-4 Typical Operating Parameters for the Single-Hop Triggered, Event-Driven Data Acquisition Application Profile ....................................................................................C-7 C-5 Typical Operating Parameters for the Single-Hop Command and Control Application Profile............................................................................................................................C-9 D-1 Power Regulations ....................................................................................................... D-2 CCSDS 882.0-M-1 Page vii May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS 1 1.1 INTRODUCTION PURPOSE This document presents the recommended practices for the utilization of low data-rate wireless communication technologies in support of spacecraft ground testing and flight monitoring and control applications. Relevant technical background information can be found in reference [3]. The recommended practices contained in this document enable member agencies to select the best option(s) available for interoperable wireless communications in the support of spacecraft monitoring and control applications. The specification of a Recommended Practice facilitates interoperable communications and forms the foundation for cross-support of communication systems between separate member space agencies. 1.2 SCOPE This Recommended Practice is targeted towards monitoring and control systems, typically low data-rate and low-power wireless-based applications. 1.3 APPLICABILITY This Recommended Practice specifies protocols (including at least the Physical [PHY] layer and Medium Access Control [MAC] sublayer of the Open Systems Interconnection [OSI] Model—see reference [F1]) that enable a basic interoperable wireless communication system to support low data-rate spacecraft monitoring and control applications. 1.4 RATIONALE From an engineering standpoint, mission managers, along with engineers and developers, are faced with a plethora of wireless communication choices, both standards-based and proprietary. This Recommended Practice provides guidance in the selection of systems necessary to achieve interoperable communications in support of wireless, low data-rate monitoring and control. 1.5 DOCUMENT STRUCTURE This document is composed from a top-down (technology) perspective, first defining the technology as a recommended practice, then providing informative material supporting specific application profiles. (For more information on space mission use cases addressed by wireless technologies, see reference [3]). Section 2 provides an informational overview of the rationale and benefits of spacecraft onboard wireless technologies for use in spacecraft monitoring and control operations. CCSDS 882.0-M-1 Page 1-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS Section 3 provides recommended practices and applicable standards relating to low data-rate wireless communication systems. Annex A justifies the choice of an alternative, scheduled medium access scheme. Annex B discusses security considerations related to the specifications in this document. Annex C provides an informative description of the recommended practices, through an overview of the technologies, and a set of application profiles where the recommendations are applicable. Annex D provides justification for selection of the 2.4 GHz band. Annex E lists abbreviations used in this document along with their expanded forms. Annex F provides a list of informative references. 1.6 DEFINITIONS low data-rate: 250 kbps or less. NOTE – In general the definition of low data-rate is somewhat ambiguous; for this Recommended Practice it is specified as 250 kbps. low power: 10 mW or less (typical). quality of service, QoS: The ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. 1.7 CONVENTIONS 1.7.1 NOMENCLATURE The following conventions apply for the normative specifications in this Recommended Practice: a) the words ‘shall’ and ‘must’ imply a binding and verifiable specification; b) the word ‘should’ implies an optional, but desirable, specification; c) the word ‘may’ implies an optional specification; d) the words ‘is’, ‘are’, and ‘will’ imply statements of fact. NOTE – These conventions do not imply constraints on diction in text that is clearly informative in nature. CCSDS 882.0-M-1 Page 1-2 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS 1.7.2 INFORMATIVE TEXT In the normative section of this document, informative text is set off from the normative specifications either in notes or under one of the following subsection headings: 1.8 – Overview; – Background; – Rationale; – Discussion. REFERENCES The following publications contain provisions, which through reference in this text, constitute provisions of this document. At the time of publication, the editions indicated were valid. All publications are subject to revision, and users of this document are encouraged to investigate the possibility of applying the most recent editions of the publications indicated below. The CCSDS Secretariat maintains a register of currently valid CCSDS publications. [1] IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE Std 802.15.4a™-2011. New York: IEEE, 2011. [2] Wireless Systems for Industrial Automation: Process Control and Related Applications. ISA-100.11a-2011. Durham, North Carolina: ISA, 2011. [3] Wireless Network Communications Overview for Space Mission Operations. Report Concerning Space Data System Standards, CCSDS 880.0-G-1. Green Book. Issue 1. Washington, D.C.: CCSDS, December 2010. CCSDS 882.0-M-1 Page 1-3 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS 2 2.1 OVERVIEW RATIONALE AND BENEFITS Monitoring and controlling the behavior of a spacecraft and launch systems, during testing phases on ground or during nominal operations in orbit, is the key to ensuring the correct functioning of various onboard systems and structures, the responses of these systems in their operational working environments, and the long-term reliability of the spacecraft. These data are also highly significant when compiling lessons learned that will be applied to building better space systems and increasing the reliability of future space components. (Refer to reference [3] for a comprehensive overview of application domains and for a detailed summary of RF communications and restrictions in differing operational environments.) The quantity of acquired spacecraft functional data depends on the ability to monitor required parameters at precise locations within a given project time and cost envelope. Hundreds and often thousands of data measurement locations are required, steadily increasing the mass (acquisition systems, cables, and harnesses) and the project costs and time (installation and verification of each new sensor). The use of wireless technologies is foreseen to reduce the integration effort, cost, and time typically required to instrument a high number of physical measurement points on a space structure. Technicians should need less time to integrate and verify their installations, while the risk of mechanically damaging interfaces during the process should be reduced. Large structures should see health monitoring equipment mass reduced, while last-minute changes in the instrumentation (e.g., addition/removal of sensing nodes at measurement points) should be easier to accept at project level. One of the byproducts of using wireless technologies in space systems is the extra flexibility introduced when implementing wireless fault-tolerance and redundancy schemes. An overriding consideration in this document is the desire to provide recommendations that utilize wireless technology to augment the overall networking infrastructure in a spacecraft rather than to provide dedicated data transport to particular end-to-end application-specific subsystems. That is, although the recommendations specified in this document are related to relatively small-scale Personal Area Networks (PANs) rather the more familiar Local Area Networks (LANs) such as Ethernet, the desire is for wireless PANs to function as natural extensions of the backbone LAN. This implies in particular that the recommendations specified herein focus on providing wireless data transport across the lower levels of the OSI model (PHY and MAC) and not on achieving higher-level application-specific behavior. 2.2 SCOPE OF INTEROPERABILITY The intent of the recommended practices promulgated in this book is to provide a framework for establishing a scalable wireless infrastructure for low-rate data transport that will (1) support traffic generated by diverse sensor types, multiple application-specific devices, and devices supplied by multiple different vendors and (2) facilitate operation of multiple wireless networks in the same bandwidth with minimal interference. The recommended CCSDS 882.0-M-1 Page 2-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS practices will ensure interoperability of low data-rate wireless devices on a common network at the PHY layer and MAC sublayer so that data packets generated by new devices entering the network will be transported by the existing network devices without regard to the sensor or application that generated the data in the packet payload. In its current form, the book’s recommendations should allow new nodes to enter a star topology network and begin communicating with a gateway. Should future revisions augment the current recommendations to allow for transport mechanisms such as peer-to-peer communication and multi-hop relaying, new nodes entering the network will not only be able to transmit their own data to a gateway, but they may also be able to communicate with other nodes and to transport data for other network devices. Adherence to these recommended practices will promote interoperability of the low data-rate wireless networks addressed in this document with other wireless networks using the same bandwidth via the interference mitigation techniques encompassed by the recommendations. 2.3 EVOLUTION OF THE BOOK The current version of this document specifies two recommended practices for low data-rate spacecraft monitoring and control. Functionally, the current recommendations can be regarded as pertaining only to the behavior of the network at the PHY layer and MAC sublayer of the OSI network stack, not at the Logical Link sublayer or higher. This level of detail in the recommendations is in line with the philosophy discussed in 2.1 above, that the recommended behavior of wireless networks should be specified only at the lower layers of the network stack (similar to the behavior specified for the backbone network in the spacecraft), leaving higher-layer behavior at the discretion of system designers. Furthermore, the two recommended practices specified in the current version of the document are restricted to a subset of the network functionality generally supported by the PHY and MAC layers of the OSI stack: one for single-hop contention-based access within a star topology and one for single-hop scheduled access within a star topology. Hence, both recommendations provide a mechanism for data packets to be exchanged between a network coordinator or gateway and individual nodes on the wireless network, but they do not address a mechanism for data packets to be exchanged between two non-coordinator nodes in the network or for communication between any two nodes via intermediary nodes in a multi-hop fashion. The evolution of this document is foreseen to propose additional recommended practices for anticipated application profiles, such as recommended practices for peer-to-peer communication in both mesh and star topologies and for multi-hop data transport in mesh topologies. The current recommendations also do not address a mechanism for exchanging data packets between a node on the network and a device outside of the wireless network. It is assumed that the network coordinator or gateway will somehow be able to communicate with the backbone network of the spacecraft, but the mechanisms for that, which are typically implemented at the Network (NWK) Layer of the stack, are beyond the scope of the current document and are not discussed. Similarly, the recommendations do not discuss or provide mechanisms for end-to-end acknowledgement or re-transmission of data packets sent CCSDS 882.0-M-1 Page 2-2 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS between user applications. The mechanisms for that behavior are typically implemented at the Transport or the Application (APP) Layer of the stack and once again are beyond the scope of the current document. While it is anticipated that future recommendations may address some functionality at the NWK layer, such as routing of Internet Protocol (IP) packets within the wireless network, it is not anticipated that protocol behavior above the NWK layer (such as any APP-layer functionality) will be addressed by future recommendations. 2.4 DIFFERENTIATING CONTENTION-BASED AND SCHEDULED CHANNEL ACCESS There are two predominant types of medium-access schemes currently utilized in wireless sensor networks: random or contention-based access and scheduled access (see reference [F2]). Contention-based schemes require no centralized control of network access and are thus well suited for ad-hoc network architectures as well as other situations where it is desirable to minimize network administration overhead and operational complexity. Nodes are allowed to attempt channel access at arbitrary times in an ad-hoc fashion as dictated by local data traffic flow and must therefore contend with one another for access in a fairly random manner. The most common contention-based access technique utilized in sensor networks is Carrier-Sense Multiple Access (CSMA) with Collision Avoidance (CA), generally abbreviated as CSMA-CA or simply CSMA. In contrast, scheduled access schemes require some type of (generally centralized) control mechanism for coordinating network access for all nodes in the network in a synchronized fashion. Typically, this will be based on predetermined or anticipated traffic flow so that bandwidth is available in a predictable manner that precludes contention among the nodes. This approach increases network administrative overhead and operational complexity but facilitates QoS guarantees and deterministic network behavior. The most common scheduled access technique utilized in sensor networks is Time-Division Multiple Access (TDMA). In terms of application support, CSMA is best suited for situations where tight bounds on packet latency and packet jitter are not required but nodes may sometimes require relatively large amounts of available channel bandwidth for relatively short periods of time in a relatively unpredictable manner. CSMA does not readily support deterministic network behavior but does readily support bursty and aperiodic traffic flow. In contrast, TDMA is well suited for applications requiring much tighter bounds on packet latency and jitter but for which the traffic flow from the nodes is more uniform and predictable. TDMA readily supports deterministic network behavior but is generally better suited for applications with less bursty and more periodic traffic flow. In addition, interference avoidance schemes such as frequency hopping are far more easily implemented in a scheduled TDMA MAC sublayer than in a contention-based CSMA MAC sublayer. The same applies to maintaining connectivity in a mesh network topology that supports multi-hop relay traffic with battery powered nodes on a low duty cycle (long sleep period, short active period), although multihop transport is beyond the scope of the current Recommended Practice. CCSDS 882.0-M-1 Page 2-3 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS 2.5 SECURITY PROVISIONING Wireless networks suffer the maladies of both active tampering and passive eavesdropping due to the inherent nature of wireless communications where access to the transmission media is not a physical constraint as within wired communications. In addition, wireless sensors have severely limited computational processing power and may have no available onboard data storage. Because of the computational complexity of cryptographic algorithms, coupled with the limited battery-based lifetime of a wireless sensor node, security provisioning in these types of devices is a pragmatic engineering balance. The cryptographic mechanism in this standard is based on symmetric-key cryptography and uses keys that are provided by higher-layer processes; the mechanism assumes a secure implementation of cryptographic operations and secure and authentic storage of keying material (reference [1]). For the recommended practice contained in this document, the PHY/MAC layer provides services that support data confidentiality, data integrity (authenticity), and replay protection: Table 2-1: PHY/MAC Security Service Provisioning Security service Description Data confidentiality Transmitted information is disclosed only to parties for which it is intended Data integrity Assurance of the source of transmitted information (and, hereby, that information was not modified in transit) Replay protection Assurance that duplicate information is detected NOTE – Per annex B some of the required security architectural elements may be implemented at higher layers (e.g., key management) in the OSI stack and are not strictly defined, or implemented, at the PHY/MAC layer. 2.6 QUALITY OF SERVICE PROVISIONING Both of the recommended practices prescribed in 3.2 provide support for implementing QoS provisioning so that system designers can implement their QoS policies over the wireless network. In the 802.15.4 CSMA-CA operational mode, QoS primitive operations are achieved utilizing Guaranteed Time Slots (GTS) as shown in figure 2-1. Briefly, the active portion of the superframe is composed of a beaconing period, a Contention Access Period (CAP) and a CCSDS 882.0-M-1 Page 2-4 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS Contention Free Period (CFP); the slotted CSMA scheme is utilized during the CAP, and the GTS scheme is utilized during the CFP period. Beacon Active portion Inactive portion Beacon CFP CAP GTS GTS 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 superframe duration beacon interval Figure 2-1: IEEE 802.15.4 Superframe The GTS scheme enables bandwidth reservation between an 802.15.4 PAN coordinator and a PAN device. Notably, more sophisticated QoS schemes that attempt to enforce either some type of fairness for all nodes in the network and/or to handle nodes entering and leaving the network are advanced functionality that is typically implemented at the higher Network (NWK) Layer of the communications stack. In the 802.15.4 scheduled medium-access operational mode, which is TDMA-based, the available TDMA slots are analogous to CSMA GTS slots during the CFP. Integrated communication stacks based on 802.15.4 (e.g., ZigBee, ISA100, 6LoWPAN, 802.15.4e—see reference [F7]) all enable deployment-wide QoS at the NWK layer. (Refer to annex A for additional QoS provisioning provided in the ISA100.11a recommendation.) CCSDS 882.0-M-1 Page 2-5 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS 3 3.1 RECOMMENDED PRACTICES FOR LOW DATA-RATE WIRELESS COMMUNICATIONS FOR SPACECRAFT MONITORING AND CONTROL OVERVIEW This section presents the recommended practices for spacecraft monitoring and control applications using low data-rate wireless communication technologies. (See table C-2 for a non-exhaustive set of example use-cases that may benefit from using low data-rate wireless communications.) As discussed in section 2, in order to ensure the most basic interoperability between low data-rate wireless communication devices, the current recommendations are focused on specification of functionality at the air interface PHY layer and the MAC sublayer of the OSI model. Following this guideline, two different compliant systems would thus be able to share the medium and potentially join the same wireless network. 3.2 RECOMMENDED PRACTICES 3.2.1 APPLICATIONS SUITED FOR SINGLE-HOP CONTENTION-BASED COMMUNICATIONS For spacecraft monitoring and control activities employing low data-rate contention-based wireless communications in single-hop configurations, both the air interface PHY layer and the MAC sublayer shall comply with the IEEE 802.15.4-2011 specification (reference [1]). Single-hop contention-based communication networks and devices should utilize the 2.4 GHz frequency band. (See annex D for rationale pertaining to 2.4 GHz band preferences; see reference [3] for Electromagnetic Interference (EMI) considerations of the 2.4 GHz frequency band.) 3.2.2 APPLICATIONS SUITED FOR SINGLE-HOP SCHEDULED MEDIUMACCESS COMMUNICATIONS For spacecraft monitoring and control activities employing low data-rate communications utilizing a scheduled medium-access scheme in a single-hop configuration, both the air interface PHY layer and the MAC sublayer shall comply with the ISA100.11a-2011 PHYlayer and MAC-sublayer specifications (reference [2]). 3.2.3 RESTRICTIONS/HAZARDS When selecting a wireless technology for application in a spacecraft environment, the risks associated with the selected radio frequency band, transmission power level, and physical location should be taken into account for the following governing environmental factors: a) Operation in explosive environments; b) RF exposure levels in excess of governmental limits (see annex D); c) Electromagnetic Compatibility (EMC). CCSDS 882.0-M-1 Page 3-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS ANNEX A JUSTIFYING THE SCHEDULED MEDIUM ACCESS RECOMMENDATION (INFORMATIVE) A1 BACKGROUND From its introduction 2003, application of IEEE 802.15.4 to embedded sensing tasks has been steadily increasing. Use has been largely limited to home and office automation, however, since it has been found that 802.15.4 reliability suffers as the RF complexity of the environment in which it is deployed increases. Specifically, industrial deployments of 802.15.4 are often observed to exhibit unacceptably low reliability and high latencies. Amendments incorporated in the IEEE 802.15.4-2006 revision recommended, and even those subsequently incorporated in the 802.15.4-2011 revision, have failed to address these concerns adequately, leading to native IEEE 802.15.4’s being widely considered a poor solution for process monitoring and control in harsh industrial environments. This discrepancy is documented in the IEEE 802.15.4e-2012 amendment, which incorporates a scheduled MAC layer very similar to the ISA100.11a MAC recommended in this Magenta Book. In justifying the update to 802.15.4-2011 provided by the 802.15.4e amendment, the IEEE states that “this amendment to IEEE Std 802.15.4-2011 specifies additional media access control (MAC) behaviors and frame formats that allow IEEE 802.15.4 devices to support a wide range of industrial and commercial applications that were not adequately supported prior to the release of this amendment.” It goes on to observe “industrial applications (and some commercial applications) have critical requirements such as low latency, robustness in the harsh industrial RF environment, and determinism that are not adequately addressed by IEEE Std 802.15.4-2011” (reference [F7]). Given that many spaceflight applications have constraints on reliability and latency similar to those in industrial process control, it was determined that this Magenta Book required a recommendation that rectifies many of the shortcomings in IEEE 802.15.4-2006 (and later, 802.15.4-2011) that the IEEE itself recognizes. Unfortunately, IEEE 802.14.4e-2012 is new enough that there are not sufficient commercial parts available for testing to justify its inclusion in the present edition of this Magenta book, although future editions may adopt it as the scheduled MAC recommendation. Instead, the ISA100.11a MAC, which along with the WirelessHART standard inspired the IEEE 802.15.4e-2012 recommendation, is adopted here due to the availability of radios for testing. Indeed, testing by the authors of this Magenta Book has confirmed the relative robustness of ISA100.11a and the relative weakness of IEEE 802.15.4 in the presence of WiFi interference (reference [F8]). ISA100.11a is chosen over WirelessHART since it is capable of supporting a greater variety of application layers and is in general more customizable. (For a detailed comparison of the two, see reference [F9].) CCSDS 882.0-M-1 Page A-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS A2 MECHANISMS FOR INCREASED ROBUSTNESS ISA100.11a provides a number of mechanisms for increasing the overall quality of service. As mentioned in 2.4, the scheduled ISA100.11a MAC provides greater determinism for channel access. Time in an ISA100.11a network is divided into slots, and a time distribution mechanism embedded in packet acknowledgements ensures that radios keep slot boundaries synchronized with respect to neighboring radios to ensure coordinated transmission/reception between communicating pairs. A Network Manager overseeing operation of the ISA100.11a network allocates communication opportunities to radios requesting bandwidth, thereby ensuring time diversity within the ISA100.11a network. That is, an individual radio within the network will only attempt to use the wireless medium in a time slot assigned to that radio for transmission. If the attempt fails for any reason (e.g., excessive RF interference), the transmission will be retried at the radio’s next scheduled opportunity. Furthermore, frequency diversity is added by the Network Manager, assigning one of the up to 16 channels available under the 802.15.4 2.4 GHz DSSS PHY employed by ISA100.11a to the communication attempt. Should a retransmission be required, the next scheduled attempt will be on a different channel, drawn from a predetermined channel-hopping sequence. Time synchronization between radios allows the Network Manager to configure the receiving radio to have its receiver tuned to the channel of the transmitter for the scheduled transaction. ISA100.11a supports adaptive blacklisting, so that channels on which communication attempts repeatedly fail can be removed from sending and receiving radios’ channel hopping sequences. For multi-hop topologies, spatial diversity is also added through the use of routing graphs with redundant next-hop paths, although that is outside the scope of this Magenta Book’s current recommendation for single-hop communication. These diversity features, taken together, enhance the ability of ISA100.11a to coexist with other RF systems that are acting as interferers. It should also be noted that, since ISA100.11a uses the 2.4 GHz DSSS PHY specified in IEEE 802.15.4-2006, it inherits the benefits of the Clear Channel Assessment (CCA) service used by the CSMA MAC of 802.15.4, which in particular promotes non-interference of the ISA100.11a radios with other systems operating in the same RF band. CCSDS 882.0-M-1 Page A-2 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS ANNEX B SECURITY CONCERNS FOR WIRELESS SYSTEMS (INFORMATIVE) B1 INTRODUCTION The 802.15.4 and ISA100.11a specifications recommended in this book describes RF wireless PHY-layer and MAC-sublayer protocols for low-power and relatively low data-rate networked communications. These specifications support a diverse application domain; wireless applications for space operations can benefit from the security features provided in these PHY-layer/MAC-sublayer protocol specifications. Communications security attempts to ensure the confidentiality, integrity, and/or authenticity of transmitted data, as required depending on the threat, the mission security policy(s), and the desire of the mission planners. It is possible, and often likely, to require all three of these security attributes to ensure that the communications data payload is not disclosed, not altered, and not spoofed. Specific potential threats and attack scenarios relevant to the space flight operations domain are addressed in more detail in reference [F5]. A summary of typical space agency use cases is provided in reference [3]. Threats and attack scenarios for ground segment operations, i.e., AIT activities, are typical in scope to general terrestrial security concerns. B2 GENERAL RISKS A MAC-sublayer security protocol provides four basic security services: access control, message integrity, message confidentiality, and replay protection (reference [F6]). Access control and message integrity. Access control means the MAC-sublayer protocol should prevent unauthorized parties from participating in the network. Legitimate nodes should be able to detect messages from unauthorized nodes and reject them. Also, a secure network should provide message integrity protection: if an adversary modifies a message from an authorized sender while the message is in transit, the receiver should be able to detect this tampering. Including a message authentication code with each packet provides message authentication and integrity (reference [F6]). Confidentiality. Confidentiality means keeping information secret from unauthorized parties. It is typically achieved with encryption. Preferably, an encryption scheme should not only prevent message recovery, but also prevent adversaries from learning even partial information about the messages that have been encrypted (reference [F6]). Replay Protection. An adversary that eavesdrops on a legitimate message sent between two authorized nodes and replays it at some later time engages in a replay attack. Since the CCSDS 882.0-M-1 Page B-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS message originated from an authorized sender it will have a valid message authentication code, so the receiver will accept it again. Replay protection prevents these types of attacks (reference [F6]). The 802.15.4 security implementation is handled at the MAC sublayer, below application control. The application specifies its security requirements by setting the appropriate control parameters in the radio stack. If an application does not set any parameters, then security is not enabled by default. That is, when using 802.15.4, an application must explicitly enable security. As discussed in C1.3, security is implemented automatically in ISA100.11a. B3 SECURITY CONCERNS Several security concerns specific to the IEEE 802.15.4 design are addressed in more detail in reference [F6]; the reader is strongly encouraged to review the identified shortcomings. It may be necessary to apply security services at multiple layers within the protocol stack, to account for distributed processing and cross-support, to account for different classes of data or end users, or to account for protection of data during unprotected portions of the complete end-to-end transmission (e.g., across ground networks). The specification of security services at other layers is outside the scope of this document. B4 CONSEQUENCES OF NOT APPLYING SECURITY Without authentication, unauthorized commands or software might be uploaded to a spacecraft or data received from a source masquerading as the spacecraft. Without data integrity, corrupted commands or software might be uploaded to a spacecraft potentially resulting in the loss of the mission. Without data integrity, corrupted telemetry might be retrieved from a spacecraft that could result in an incorrect course of action being taken. If confidentiality is not implemented, data flowing to or from a spacecraft might be visible to unauthorized entities resulting in disclosure of sensitive or private information. CCSDS 882.0-M-1 Page B-2 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS ANNEX C DISCUSSION ON LOW DATA-RATE WIRELESS COMMUNICATIONS FOR SPACECRAFT MONITORING AND CONTROL (INFORMATIVE) C1 C1.1 GENERAL OVERVIEW The following subsections contain engineering discussions applicable to the recommended practices in section 3. C1.2 CONTENTION-BASED CHANNEL-ACCESS MECHANISM As discussed in 2.4, the operation of a contention-based channel-access mechanism cannot readily support packet delivery with reliably low and predictable latency in many situations, particularly when the number of active nodes in the network grows to even moderate levels. As such, it is generally not appropriate for use in situations requiring deterministic or ‘realtime’ behavior, such as spacecraft control guidance and navigation loops or life-critical applications. Similarly, the 802.15.4 MAC sublayer specified in Recommended Practice 3.2.1 provides no specific mechanisms for adaptive channel selection or interference avoidance. The recommendation as stated presumes operation on a single, predetermined subchannel of the 2.4 GHz ISM band and persistent interference on the selected channel will lead to substantial performance degradation. Mechanisms for detecting and avoiding such interference, if necessary, must be implemented at higher layers of the protocol stack. As such, the current recommended practice may not be well suited for operation in a very cluttered spectral environment with many different wireless systems contending for the same bandwidth. Additionally, the environment may induce interference effects such as multi-path fading. When these effects are time-varying and not well characterized a priori, the current recommended practice may not be well suited. Conversely, the current recommended practice can be expected to work very well in environments for which the available spectrum is well understood over time and carefully managed.. Although Recommended Practice 3.2.1 applies specifically only to single-hop communication between a client node and the network coordinator in a star network topology, the recommended standard protocol, IEEE 802.15.4, will also support communication modes and services not specifically addressed in the recommendation if appropriate functionality is provided by higher layers of the protocol stack. For example, while considerations regarding communication security are beyond the scope of the current CCSDS 882.0-M-1 Page C-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS recommendation, the 802.15.4 MAC sublayer specification defines encryption and decryption services for symmetric-key cryptographic techniques that will support secure communication if procedures for establishing and maintaining the necessary keys are provided by higher layers. Similarly, while peer-to-peer and multi-hop communication within an arbitrary mesh topology are beyond the scope of the current recommendation, the 802.15.4 MAC sublayer specification does provide support for these communication modes if the necessary routing and synchronization mechanisms are implemented in higher layers of the protocol stack. These limitations and capabilities must be understood and considered carefully when making an engineering decision regarding the applicability of a contention-based access mechanism in general or recommendation 3.2.1 in particular. C1.3 SCHEDULED CHANNEL-ACCESS MECHANISM A scheduled channel-access mechanism requires a method for synchronizing transmissions/receptions among the nodes in the network. Furthermore, the ISA100.11a recommendation allows nodes to switch among the 16 available channels in the 802.15.4 2.4 GHz PHY with each subsequent transmission attempt, coordinating transmitters and receivers so that they both use the same channel at the same time. As discussed in annex A, a centralized Network Manager entity is required to establish this ‘channel hopping’ mechanism for each node in the network and mediate bandwidth usage through granting communication ‘contracts’ to nodes. The Network Manager is the key to an ISA100.11a network’s operation and is its most complicated component. A Network Manager is constantly optimizing the channel-hopping scheme in response both to nodes’ requests for communication bandwidth and nodes’ reports of the channel qualities in their individual locations. Implementing this functionality from scratch, while possible, may prove time-consuming and it may be more feasible to employ a pre-certified ISA100.11a Network Manager. This, however, comes with a caveat: ISA100.11a is designed as a complete networking solution for high-reliability industrial process monitoring and control. As a result, an ISA100.11a-compliant Network Manager functions on all levels (PHY through APP) of the OSI model. To achieve the PHY- and MAC-sublayer behavior specified in this Recommended Practice, the use of a complete ISA100.11a stack configured so that behavior at layers above the MAC sublayer is either disabled or transparent to the user is advised. Specifically, the following configuration is recommended: a) All nodes, except for the network gateway, should be configured as non-routing devices. b) APP layer tunneling should be used to bypass the object-oriented APP layer scheme recommended by ISA100.11a. Configuration a) results in a star network topology, giving the single-hop behavior mandated in this recommended practice. It reduces functionality at each of the upper Data Link and CCSDS 882.0-M-1 Page C-2 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS NWK layer to a pass-through, since the upper Data Link layer is responsible for multi-hop routing within an ISA100.11a mesh network and the NWK layer is responsible for routing outside of the gateway on the backbone network (a recommendation for which is not covered in this document). Configuration b) reduces functionality at each of the Transport and APP layers to a pass-through as well. It is worth noting that over-the-air transmissions must be secured in an ISA100.11a network. While security is optional in the 802.15.4 PHY/MAC recommendation, some level of security is required in the ISA100.11a PHY/MAC recommendation implicitly through the use of an ISA100.11a stack configured as directed above. A Security Manager entity joins the Network Manager in a proper ISA100.11a implementation, and its inclusion is nonoptional. Messages are encrypted on both a hop-by-hop and end-to-end basis, and distribution and maintenance of encryption keys is handled automatically by the Security Manager. As such, this Recommended Practice covers secure, single-hop communications. Should a user wish to extend this functionality to multi-hop communication, configuration a) can of course be ignored, but such functionality is outside the scope of the current recommended practice. It is also worth cautioning the user that ISA100.11a is a relatively resource-heavy protocol with regards to computational complexity at the Network Manager. Network formation will generally take longer compared to the 802.15.4 PHY/MAC recommendation, and support for node mobility will be more limited. The same caveat applies to administrative messages to the nodes from the Network Manager (and vice versa). A greater percentage of available bandwidth will be used to maintain the ISA100.11a network to achieve more efficient use of the remaining bandwidth in contention-based environments. Thus the current Recommended Practice can be expected to work quite well in an environment in which contention for bandwidth from other systems and interference effects are significantly present but not well modeled. Conversely, when the available spectrum is well understood over time and carefully managed, the current Recommended Practice may not be well suited. C2 C2.1 APPLICATION PROFILES OVERVIEW An application profile is an explicit listing of the configuration settings of a typical implementation that may be suitable for multiple use cases or applications. Table C-1 is a quick-look table, which lists the most common application profiles targeted by the two recommendations specified in this document. It should be noted that all of these application profiles are based on a star network topology in which the individual nodes in the network all communicate directly with a central gateway node that aggregates data, disseminates commands, or both. Both the 802.15.4 standard, which is specified in 3.2.1 and the ISA100.11a standard, which is specified in 3.2.2, are well suited for applications based on such a topology and can be expected to work well for both periodic, fixed-length, block data transfer as well as aperiodic, variable-length, bursty data transfer. CCSDS 882.0-M-1 Page C-3 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS Table C-1: Application Profile Quick Look-Up Table List of application profiles falling under the recommended practice 1. Single-hop periodic data aggregation 2. Single-hop triggered (event-driven) data aggregation 3. Single-hop, latency tolerant command and control or command-driven data aggregation (polling) Table C-2 presents a set of use-cases that may benefit from using low data-rate wireless communications. Table C-2: Quick-Look Table for Scenarios That Can Utilize Low Data-Rate Wireless Communications Use-case Typical examples Assembly, Integration and Testing (AIT) / Ground Support Equipment (GSE) / Developmental Flight Instrumentation (DFI) activities Thermal chamber testing, vibration testing, data bus monitoring… Spacecraft onboard health monitoring Temperature and radiation level monitoring, impact detection… Scalability / extensibility / retro-fit of instrumentation capabilities Instrument replacement, adding capability to existing vehicles… Habitat environmental monitoring and control Temperature, humidity, pressure monitoring… Crew (physiological) monitoring Heartbeat, temperature, location… Scientific monitoring and control Periodic observation of experimental variables… Intra-spacecraft robotic activities low data-rate positioning telemetry, health data… CCSDS 882.0-M-1 Page C-4 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS C2.2 SINGLE-HOP PERIODIC DATA AGGREGATION The single-hop periodic data-aggregation profile covers the most common implementation of a wireless sensor network, one that consists of a central data sink (i.e., a gateway or network coordinator) and a number of child nodes that perform periodic data acquisition. The network is configured in a star topology, with each child node having a direct link to the coordinator. Typically, a child node wakes up from a very low-power (sleep) mode on a predetermined periodic schedule, executes a data acquisition task, formats the acquired data, transmits a data packet to the network coordinator, and then goes back into sleep mode. Alternatively, the acquisition node may sample data during each wake cycle but only transmit data to the coordinator when a full packet’s worth of data has been accumulated. The coordinator node, which either never sleeps or sleeps only infrequently, aggregates the data from all of the child nodes and relays it over a backbone network to user applications that consume the data. Generally, the duty cycle of the child nodes is quite low, with data acquired at rates from one observation per second down to one observation every several minutes and children often spending 99 percent or more of their lifetimes in sleep mode. For this profile, the data payload transmitted in each packet is generally small and fixed in size. Vehicle ground test applications require flexibility in the implementation of the tests and the location and orientation of the nodes and antennas. Hence, it is often the case that all nodes will have omnidirectional antennas rather than directional higher-gain antennas. The RF transmit power is a very application-specific parameter and heavily depends on the operational environment and on EMI/EMC constraints. Some spacecraft will not allow transmission powers higher than perhaps -15 dBm, while others may permit powers up to 10 dBm. In contrast, for other applications such as structural testing of small components in a laboratory thermal-vacuum chamber, relaxed transmit power constraints are often seen. The permissible transmit power is thus one of the first parameters/constraints to be identified before setting up a wireless sensor network. The number of acquisition nodes in the wireless network is also very application-dependent. In a typical laboratory testing activity, a few nodes, each with several sensors, may well prove to be enough for the task at hand. Spacecraft testing and monitoring on the other hand may require the utilization of hundreds of wireless nodes. Table C-3 summarizes the high-level implementation parameters and operational configurations for the periodic data aggregation application profile. CCSDS 882.0-M-1 Page C-5 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS Table C-3: Typical Operating Parameters for the Single-Hop, Periodic Data Aggregation Application Profile Implementation parameter / operational configuration C2.3 Typical value Topology Star Antenna type Typically omnidirectional Transmit power Typically -15 dBm to +10 dBm Typical number of nodes 10 – 100 Antenna Polarization (master/slave) Linear/linear; circular/linear Spectrum/Channel utilization Per IEEE 802.15.4 specifications; spectrum and channel management Typical communication range 0 – 10 m Typical transmit periodicity Seconds to minutes Expected battery life Months to years Typical receiver periodicity Low Latency constraints Typically relaxed Routing None Data payload characteristics Periodic, fixed-length, uniform rate SINGLE-HOP TRIGGERED EVENT-DRIVEN DATA ACQUISITION The single-hop triggered-event-driven data-acquisition profile covers an implementation of a wireless sensor network that consists of a central data sink and a number of child nodes that perform non-periodic data acquisition. The network is configured in a star topology, with each child node having a direct link to the coordinator. For this profile, however, a child node wakes up to acquire data only when triggered by the occurrence of some local event rather than on a predetermined periodic schedule. The triggering event is sensed by the child node using a low-power circuit that remains active even in sleep mode. When data collection is triggered, the acquisition node collects some amount of data, which may be either predetermined or based on the length or intensity of the triggering event. The collected data may be transmitted back to the sink in raw form or may be processed locally to reduce the data in some fashion. In either case, the resulting data payload is formatted and transmitted back to the sink via a single packet or subdivided into several sequential packets, as necessary. The coordinator node, which either never sleeps or sleeps only infrequently, aggregates the data from all of the child nodes and relays it over a backbone network to user applications that consume the data. For this profile, the duty cycle of the child nodes is obviously determined by the frequency of triggering events, but is generally extremely low. CCSDS 882.0-M-1 Page C-6 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS General considerations regarding antenna configuration, power level, and network size are identical to those discussed in table C-3. Table C-4 summarizes the high-level implementation parameters and operational configurations for the event-driven data aggregation application profile. Table C-4: Typical Operating Parameters for the Single-Hop Triggered, EventDriven Data Acquisition Application Profile Implementation parameter / operational configuration C2.4 Typical value Topology Star Antenna type Typically omnidirectional Transmit power Typically -15 dBm to +10 dBm Typical number of nodes 10 – 100 Antenna Polarization (master/slave) Linear/linear; circular/linear Spectrum/Channel utilization Per IEEE 802.15.4 specifications; spectrum and channel management Typical communication range 0 – 10 m Typical transmit periodicity Event driven Expected battery life Months to years Typical receiver periodicity Low, depends on beacon and acknowledgement mode Latency constraints Typically relaxed Routing None Data payload characteristics Non-periodic, variable-length, bursty SINGLE-HOP COMMAND AND CONTROL OR COMMAND-DRIVEN DATA AGGREGATION The single-hop command-and-control or command-driven data-aggregation profile again covers an implementation of a wireless sensor network that consists of a central coordinator and a number of child nodes. In this case, however, the child nodes may acquire data from a sensor, control an actuator, or both. Further, in this profile, data may flow not only from the child node to the coordinator in the form of telemetry or command status, but also from the coordinator to the child node in the form of commands. The network is configured in a star topology, with each child node having a direct, bi-directional link to the coordinator. CCSDS 882.0-M-1 Page C-7 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS For the command-driven data aggregation application, a child node wakes up on a periodic schedule and communicates with the coordinator for a possible command to acquire data. If there is no command waiting, the node goes back into sleep mode. If there is a data acquisition command waiting, the node decodes the command, acquires and formats the requested amount of data, transmits the data back to the coordinator in as many packets as necessary, and goes back into sleep mode. For the command and control application, the child node wakes up on a periodic schedule and polls the coordinator for a possible command to change an actuator setting. If there is no command waiting, the node goes back into sleep mode. If there is an actuation command waiting, the node retrieves the command, decodes it, activates an appropriate control signal for the actuator, optionally transmits a command status to the coordinator (e.g., success/failure), and goes back into sleep mode. One could again envision such an operation being conducted in conjunction with the periodic or eventtriggered transmissions in C2.2 and C2.3. Should a control algorithm interfacing with the gateway decide a local actuation (e.g., turning on a heater or a fan) is necessary based on measured data (e.g., a temperature reading), a command for that actuation would be sent to the node which measured the data and is capable of actuating the control device. For either application, the coordinator aggregates the data from all of the child nodes (either telemetry or command status data) and relays it over a backbone network to user applications that consume the data. The coordinator once again sleeps only infrequently. The duty cycle of the child nodes is command-driven, but is generally extremely low. General considerations regarding antenna configuration, power level, and network size are again identical to those discussed in C2.2. Table C-5 summarizes the high-level implementation parameters and operational configurations for both the command and control and command-driven data aggregation application profiles. CCSDS 882.0-M-1 Page C-8 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS Table C-5: Typical Operating Parameters for the Single-Hop Command and Control Application Profile Implementation parameter / operational configuration Typical value Topology Star Antenna type Typically omnidirectional Transmit power Typically -15 dBm to +10 dBm Typical number of nodes 10 – 100 Antenna Polarization (master/slave) Linear/linear; circular/linear Spectrum/Channel utilization Per IEEE 802.15.4 specifications; spectrum and channel management Typical communication range 0 – 10 m Typical transmit periodicity Command-driven Expected battery life Months to years Typical receiver periodicity Low, depends on beacon and acknowledgement mode Latency constraints Typically relaxed Routing None Data payload characteristics A-periodic, variable-length, bursty CCSDS 882.0-M-1 Page C-9 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS ANNEX D JUSTIFICATIONS FOR THE 2.4 GHZ BAND PREFERENCE (INFORMATIVE) Standard 802.15.4 allows for operation at one frequency in the 868 MHz band (license-free in Europe), ten frequencies in the 900-915 MHz band (license-free in the United States) and sixteen frequencies in the 2.4-2.485 GHz band (license-free world-wide). Of these, the 2.4 GHz band was chosen for the following reasons. Outside the United States, operation between 900 and 915MHz requires a license, and in Europe systems operating in this band must compete with a radar band, so the license is generally only available on an ‘at risk’ basis. This implies that the operator cannot restrict the operation of an interfering system but can be shut down if it interferes with anyone else who is licensed in that band. This incurs a risk to guaranteed operation. Antennas for lower-frequency radiation must be larger than antennas for higher-frequency radiation in order to achieve the same efficiency and gain. Hence, antennas for communication nodes operating in the UHF bands (868 MHz and 900-915 MHz) will generally be much larger than antennas for nodes operating in the 2.4 GHz band (see reference [F3]). The UHF wavelength is approximately 0.3 meters, which is of the same order as the size of many spacecraft cavities. In such environments, UHF propagation is likely to be influenced by resonant mechanisms. The 2.4 GHz wavelength is approximately 12.5 cm, so multipleantenna techniques can be readily utilized, even by small devices, to provide spatial diversity and/or multiplexing gain in reverberant environments (see reference [F4]). Because of the international acceptance of other 2.4 GHz systems such as 802.11b/g/n, radios and antennas for this band are readily available commercially. Radios for 868-915 MHz are less common. Additionally, with more frequencies available in the 2.4 GHz band, there is more opportunity for selection to avoid co-channel or adjacent channel interference. Regional Constraints Unlicensed operation of wireless networks is in bands designated by the ITU, but governed by national and international standards. At the top level, band availability is by ITU Region: Region 1: Europe, Africa, the former Soviet Union, Mongolia, and the Middle East west of the Arabian Gulf including Iraq. Region 2: The Americas, Greenland, and some of the Eastern Pacific Islands. Region 3: Most of Oceania, and Asia outside the former Soviet Union, with the exception of those areas of the Middle East designated in Region 1. CCSDS 882.0-M-1 Page D-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS Under ITU regulations, the 900-928MHz band is not to be used outside Region 2, especially in areas that use the GSM 900 band, with the exception of Australia and Israel. In the United States, the ISM bands are described by Code of Federal Regulations (CFR) Title 47 Part 18, and wireless LAN and PAN are governed by Part 15 Subpart 247. Canadian regulation is Industry Canada regulations, with the basic regulations for licenseexempt operation covered by Radio Standards Specification (RSS) General Requirements and Information for the Certification of Radio Apparatus (RSS-Gen), RSS-210 Licenseexempt Radio Apparatus (All Frequency Bands): Category I Equipment, and explicit regulations in RSS-210 Annex 8. In addition, Health Canada Safety Code 6 sets radio frequency emission exposure limits. Communications standards in this band for the US and Canada, operating in the region close to the US-Canada border, are coordinated under Treaty Series 1962 No. 15 - Coordination and Use of Radio Frequencies Arrangement D (1965). In Europe the over-arching definition is by the European Telecommunications Standards Institute (ETSI), but this is subject to acceptance and ratification by local regulatory authorities. This is normally a matter of formality only. The applicable standard is EN 300 328. Japanese regulation is governed by standard ARIB-STD-T66. The official version is in Japanese, but the Association of Radio Industries and Businesses (ARIB) provides an English overview on their site www.arib.or.jp. This second-generation standard governs only the use of the 2400-2483.5 MHz band. The first generation allowed use only in the 24712497 MHz band. Table D-1: Power Regulations Band US/Canada Europe Japan 2400 – 2483.5 MHz Freely available. 1W maximum. Freely available, 100mW maximum. Freely available, 10mW / MHz maximum. 868MHz No. Available, 1 channel of operation in 802.15.4, 868868.6 MHz, 25mW maximum, duty cycle less than 1% in any one hour time period. No. 902-928 MHz Freely available, unlicensed, 1W maximum. Not available except with a license and on a noninterfering basis. Clashes with GSM900. No. This annex summarizes the national regulations for unlicensed operation of low-power lowrate data networks. These are the salient points; there is much more regulation of ancillary issues such as out-of-band emissions, and should the system designer seek to source or design a CCSDS 882.0-M-1 Page D-2 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS radio, rather than using one which is commercially available and states compliance to the regulations, then the source regulations will have to be consulted. Although not all authorities have been consulted, the European regulations have been largely adopted in ITU Region 1, the FCC/RSS Regulations in ITU Region 2, and the Japanese regulation in ITU Region 3. As can be seen from the foregoing, the 2400-2483.5 MHz band is the only one, applicable to 802.15.4, that is universally adopted. CCSDS 882.0-M-1 Page D-3 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS ANNEX E ABBREVIATIONS AND ACRONYMS (INFORMATIVE) AIT assembly, integration and testing APP Application (Layer) ARIB Association of Radio Industries and Businesses CA collision avoidance CAP contention access period CCA clear channel assessment CCSDS Consultative Committee for Space Data Systems CFP contention free period CFR Code of Federal Regulations CSMA carrier-sense multiple access CSMA-CA carrier-sense multiple access with collision avoidance DFI developmental flight instrumentation DSSS direct-sequence spread spectrum EMC electromagnetic compatibility EMI electromagnetic interference ETSI European Telecommunications Standards Institute FCC Federal Communications Commission GSE ground support equipment GSM Global System for Mobile Communications (originally Groupe Spécial Mobile) GTS guaranteed time slots IEEE Institute of Electrical and Electronics Engineers IP Internet Protocol ISM industrial, scientific, and medical CCSDS 882.0-M-1 Page E-1 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS ISO International Organization for Standardization ITU International Telecommunication Union LAN local area network MAC media access control NWK Network (Layer) OSI Open System Interconnection PAN personal area network PHY Physical (Layer) QoS quality of service RF radio frequency TDMA time-division multiple access CCSDS 882.0-M-1 Page E-2 May 2013 RECOMMENDED PRACTICE FOR LOW DATA-RATE WIRELESS COMMUNICATIONS ANNEX F INFORMATIVE REFERENCES (INFORMATIVE) [F1] Information Technology—Open Systems Interconnection—Basic Reference Model: The Basic Model. International Standard, ISO/IEC 7498-1:1994. 2nd ed. Geneva: ISO, 1994. [F2] Karl Holger and Andreas Willig. Protocols and Architectures for Wireless Sensor Networks. West Sussex, England: Wiley-Interscience, 2007. [F3] Constantine Balanis. Antenna Theory: Analysis and Design. 3rd ed. Hoboken, N.J.: Wiley-Interscience, 2005. [F4] John Proakis and Masoud Salehi. Digital Communications. 5th ed. Boston: McGrawHill, 2008. [F5] Space Data Link Security Concept of Operation. Draft Report Concerning Space Data System Standards, CCSDS 350.5-G-0. Draft Green Book. Issue 0. Washington, D.C.: CCSDS, forthcoming. [F6] Naveen Sastry and David Wagner. “Security Considerations for IEEE 802.15.4 Networks.” In WiSe ’04 Proceedings of the 3rd ACM Workshop on Wireless Security (October 1, 2004, Philadelphia), 32-42. New York: ACM, 2004. [F7] IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)—Amendment 1: MAC Sublayer. IEEE Std 802.15.4e™-2012. New York: IEEE, 2012. [F8] Raymond Wagner and Richard Barton. “Performance Comparison of Wireless Sensor Network Standard Protocols in an Aerospace Environment: ISA100.11a and ZigBee Pro.” In Proceedings of the IEEE Aerospace Conference, 2012 (3-10 March 2012 ), 1– 14. New York: IEEE, 2012. [F9] Stig Petersen and Simon Carlsen. “WirelessHART vs. ISA100.11a: The Format War Hits the Factory Floor.” IEEE Industrial Electronics Magazine 5, no. 4 (2011): 23–34. CCSDS 882.0-M-1 Page F-1 May 2013